Data Security definition

Data Security means defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. This applies regardless of the form the Data may take (electronic, physical, etc.).
Data Security. Any services that involve handling of University Data must comply with University policy 9.8, Policy on Information Resource Access and Security: xxxx://xxxxxx.xxxxxxxxxxxxx.xxx/technology/9-8.shtml . Additional terms and conditions may be required to protect University Data maintained or handled by vendors. For additional guidance contact the Information Security Office at 438-5533 or xxxxxxx@xxxxx.xxx.
Data Security. The Contractor shall adopt and apply data security standards and procedures that comply with all applicable federal, state, and local laws, regulations, and rules.

Examples of Data Security in a sentence

  • Please see attached Data Security Plan, Exhibit A (pages 5-9 of this document).

  • Contractor’s Data Security and Privacy Plan is attached to this DPA as Exhibit C.

  • As more fully described herein, throughout the term of the Master Agreement, Vendor will have a Data Security and Privacy Plan in place to protect the confidentiality, privacy and security of the Protected Data it receives from the District.

  • Vendor’s Plan for protecting the District’s Protected Data includes, but is not limited to, its agreement to comply with the terms of the District’s Bill of Rights for Data Security and Privacy, a copy of which is set forth below and has been signed by the Vendor.

  • If the DSHS Data Security Requirements Exhibit is attached to this contract, this item, 6.b.(4), is superseded by the language contained in the Exhibit.


More Definitions of Data Security

Data Security. The Company recognizes the importance of treating Data in a lawful, fair and transparent manner. The Company will apply reasonable organizational and security measures to prevent the unlawful processing and/or the accidental loss or destruction of these materials and, in particular, the personal data contained in them.
Data Security. The Service Provider shall adopt and apply data security standards and procedures that comply with all applicable federal, state, and local laws, regulations, and rules.
Data Security means the protection of information assets from accidental or intentional but unauthorized disclosure, modification, or destruction, or the inability to process that information.
Data Security. If Seller has access to Buyer’s data or technology systems or equipment, Seller shall comply with Buyer’s data protection requirements. Tax: Buyer shall pay all sales and use taxes imposed on the purchase price of Goods or Services purchased hereunder. Seller’s invoices shall include sufficient detail so Buyer may determine the sales and use tax. If applicable, Buyer will provide Seller with a copy of Buyer’s sales tax exemption certificate in lieu of paying any such tax. Seller will exercise a good faith effort to reduce the overall transaction taxes relating to purchases of Goods or Services (including use of resale certificates and claiming available exceptions) and extend to Buyer the benefit of any tax savings. Seller shall pay all other taxes, assessments, levies, or related charges relating to the sale of the Goods and Services purchased hereunder.
Data Security. Some or all of the items of Equipment returned to us at any time may contain sensitive information or data belonging to your organization, or your customer/clients/patients, that is stored, recorded, or in any way contained within or on the Equipment. You specifically agree that before the Equipment is shipped to or retrieved by us or our agents, or removed by a supplier, you will, at your sole cost and expense, permanently destroy, delete and remove all such information and data that is stored, recorded or in any way contained within or on the Equipment, to the extent that further recovery of any of such data and information is not possible. You have the sole responsibility to so destroy, delete, and remove all data and information stored in or on the Equipment. We have absolutely no liability for any data or information that you fail to so destroy, delete, and remove. All hard drives and other data retention components must function as originally installed after data removal. IMPORTANT INFORMATION ABOUT PROCEDURES FOR OPENING A NEW ACCOUNT: To help the government fight the funding of terrorism and money laundering activities, Federal law requires all financial institutions to obtain, verify, and record information that identifies each person who opens an account. What this means for you: W hen you open an account, we will ask for (i) if you are a legal entity, your name, address, and other information that will allow us to identify you; (ii) if you are an individual, your name, address, and date of birth. We may also ask to see your driver’s license or other identifying documents.
Data Security. The Sponsored center shall adopt and apply data security standards and procedures that comply with all applicable federal, state, and local laws, regulations, and rules. Duty to Report: The Sponsored center shall report a suspected or confirmed security breach to the Institution’s Contract Administrator within twenty-four (24) hours after the breach is first discovered, provided that the Sponsored center shall report a breach involving Social Security Administration data or Internal Revenue Service data within one (1) hour after the breach is first discovered. During the performance of this contract, the Sponsored center is to notify the Institution’s contract administrator of any contact by the federal Office for Civil Rights (OCR) received by the Sponsored center. Cost Borne by Sponsored center: If any applicable federal, state, or local law, regulation, or rule requires the Institution or the sponsored center to give affected persons written notice of a security breach arising out of the Sponsored center’s performance under this contract, the Sponsored center shall bear the cost of the notice. Oversight
Data Security. The Company recognizes the importance of treating Data in a lawful, fair and transparent manner. The Company will apply reasonable organizational and security measures to prevent the unlawful processing and/or the accidental loss or destruction of these materials and, in particular, the personal data contained in them. Contact: For more information on our general privacy policy please go to [_____]. If you have any questions concerning this Notice, you should contact [_____]. You understand that the Company may rely on a different legal basis for the processing and/or transfer of Data in the future and/or request that you provide another data privacy consent. If applicable and upon request of the Company or the Employer, you agree to provide an executed acknowledgement or privacy consent form (or any other acknowledgements, agreements or consents) that the Company and/or the Employer may deem necessary to obtain from you for the purpose of administering your participation in the Plan in compliance with the data privacy laws in your country, either now or in the future. You understand and agree that you will not be able to participate in the Plan if you fail to provide any such acknowledgement, agreement or consent requested by the Company and/or the Employer. ALGERIA